A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks
暂无分享,去创建一个
Demosthenis Teneketzis | Erik Miehling | Mohammad Rasouli | D. Teneketzis | Erik Miehling | M. Rasouli
[1] Yi Ouyang,et al. Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition , 2015, IEEE Transactions on Automatic Control.
[2] Pierre Bernhard. Max-Plus Algebra and Mathematical Fear in Dynamic Optimization , 2000 .
[3] Nor Badrul Anuar,et al. Intrusion response systems: Foundations, design, and challenges , 2016, J. Netw. Comput. Appl..
[4] Elchanan Mossel,et al. Spectral redemption in clustering sparse networks , 2013, Proceedings of the National Academy of Sciences.
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] Yi Ouyang,et al. On stochastic dynamic games with delayed sharing information structure , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[7] Pierre Bernhard,et al. Minimax - or feared value - L1/L∞ control , 2003, Theor. Comput. Sci..
[8] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[9] M. James,et al. Robust and Risk-Sensitive Output Feedback Control for Finite State Machines and Hidden Markov Models , 1994 .
[10] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[11] D. Bertsekas,et al. On the minimax feedback control of uncertain dynamic systems , 1971, CDC 1971.
[12] George L. Nemhauser,et al. Min-cut clustering , 1993, Math. Program..
[13] Dong Zhou,et al. Translation techniques in cross-language information retrieval , 2012, CSUR.
[14] Demosthenis Teneketzis,et al. A Supervisory Control Approach to Dynamic Cyber-Security , 2014, GameSec.
[15] Steven I. Marcus,et al. Risk-sensitive and minimax control of discrete-time, finite-state Markov decision processes , 1999, Autom..
[16] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[17] George Varghese,et al. Intrusion Response Systems: A Survey , 2008 .
[18] D. Bertsekas,et al. Recursive state estimation for a set-membership description of uncertainty , 1971 .
[19] D. Bertsekas,et al. Sufficiently informative functions and the minimax feedback control of uncertain dynamic systems , 1973 .
[20] Tansu Alpcan,et al. Network Security , 2010 .
[21] Pierre Bernhard,et al. Expected values, feared values, and partial information optimal control , 1995 .
[22] H. Witsenhausen. A minimax control problem for sampled linear systems , 1968 .
[23] Demosthenis Teneketzis,et al. Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.
[24] D. Bertsekas. Control of uncertain systems with a set-membership description of the uncertainty , 1971 .
[25] Michel Dagenais,et al. Intrusion Response Systems: Survey and Taxonomy , 2012 .
[26] Bingrui Foo,et al. CHAPTER 13 – Intrusion Response Systems: A Survey , 2008 .